Computer Security

1990-08-25T12:40:00-04:00https://images.c-span.org/defaults/capitol.jpgThe subcommittee investigated why the implementation of the Computer Securities Act of 1987 had been stalled. The Computer Securities Act of 1987 required federal agencies to secure their computer systems and called upon the National Institute of Standards and Technology to develop computer security guidelines. The act had met opposition from the National Security Agency which questioned the need for computer security guidelines for its system known as Public Key Cryptology. This system was already considered one of the most effective computer security systems. The supporters of the guidelines maintained the necessity of compatible standards to lock out unwanted intruders. The Internal Revenue Service, Federal Reserve System, Social Security Administration and the United States Air Traffic Control rely on systems that are considered vulnerable to large scale destruction of data or computer terrorism.

The subcommittee investigated why the implementation of the Computer Securities Act of 1987 had been stalled. The Computer Securities Act…
read more

Computer Security
The subcommittee investigated why the implementation of the Computer Securities Act of 1987 had been stalled. The Computer Securities Act of 1987 required federal agencies to secure their computer systems and called upon the National Institute of Standards and Technology to develop computer security guidelines. The act had met opposition from the National Security Agency which questioned the need for computer security guidelines for its system known as Public Key Cryptology. This system was already considered one of the most effective computer security systems. The supporters of the guidelines maintained the necessity of compatible standards to lock out unwanted intruders. The Internal Revenue Service, Federal Reserve System, Social Security Administration and the United States Air Traffic Control rely on systems that are considered vulnerable to large scale destruction of data or computer terrorism. close